Browse > Article
http://dx.doi.org/10.5762/KAIS.2018.19.3.1

A Study on Lightweight Block Cryptographic Algorithm Applicable to IoT Environment  

Lee, Seon-Keun (School of Mechanical System Engineering, Chonbuk National University)
Publication Information
Journal of the Korea Academia-Industrial cooperation Society / v.19, no.3, 2018 , pp. 1-7 More about this Journal
Abstract
The IoT environment provides an infinite variety of services using many different devices and networks. The development of the IoT environment is directly proportional to the level of security that can be provided. In some ways, lightweight cryptography is suitable for IoT environments, because it provides security, higher throughput, low power consumption and compactness. However, it has the limitation that it must form a new cryptosystem and be used within a limited resource range. Therefore, it is not the best solution for the IoT environment that requires diversification. Therefore, in order to overcome these disadvantages, this paper proposes a method suitable for the IoT environment, while using the existing block cipher algorithm, viz. the lightweight cipher algorithm, and keeping the existing system (viz. the sensing part and the server) almost unchanged. The proposed BCL architecture can perform encryption for various sensor devices in existing wire/wireless USNs (using) lightweight encryption. The proposed BCL architecture includes a pre/post-processing part in the existing block cipher algorithm, which allows various scattered devices to operate in a daisy chain network environment. This characteristic is optimal for the information security of distributed sensor systems and does not affect the neighboring network environment, even if hacking and cracking occur. Therefore, the BCL architecture proposed in the IoT environment can provide an optimal solution for the diversified IoT environment, because the existing block cryptographic algorithm, viz. the lightweight cryptographic algorithm, can be used.
Keywords
Bit permutation; Group operation; IoT; Lightweight cryptography; Serpent cryptographic algorithm;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Ye, J., Dobson, S., McKeever, S., "Situation identification techniques in pervasive computing", Pervasive and Mobile Computing, vol. 8, no. 1, pp. 36-66, Feb. 2012. DOI: https://doi.org/10.1016/j.pmcj.2011.01.004   DOI
2 S.D.T. Kelly, N.K. Suryadevara, S.C. Mukhopadhyay, "Towards the Implementation of IoT for Environmental Condition Monitoring in Homes", IEEE Sensors Journal, vol. 13, no. 10, 2013. DOI: https://doi.org/10.1109/JSEN.2013.2263379
3 Tapalina Bhattasali, Khalid Saeed, Nabendu Chaki, Rituparna Chaki, "A Survey of Security and Privacy Issues for Biometrics Based Remote Authentication in Cloud", IFIP International Conference on Computer Information Systems and Industrial Management CISIM 2014, pp. 112-121, 2014. DOI: https://doi.org/10.1007/978-3-662-45237-0_12
4 Lightweight Cryptography definition, https://www.cryptolux.org/index.php/Lightweight_Cryptography(accessed Aug., 03, 2017)
5 NIST, Lightweight Cryptography, https://www.nist.gov/programs-projects/lightweight-cryptography(accessed Aug., 17, 2017)
6 Z. Shi and R. B. Lee, "Bit permutation instructions for accelerating software cryptography," In Proceedings of the IEEE International Conference on Application Specific Systems, Architectures and Processors (ASAP 2000), pp. 138-148, July 2000. DOI: https://doi.org/10.1109/ASAP.2000.862385   DOI
7 J. Guo, I. Nikolic, T. Peyrin, and L. Wang, "ryptanalysis of Zorro," In IACR Cryptology ePrint Archive, 2013, 713.
8 Eli Biham. "Serpent: A New Block Cipher Proposal", Lecture Notes in Computer Science, 1998. DOI: https://doi.org/10.1007/3-540-69710-1_15
9 Mansoor Ebrahim, Shujaat Khan, Umer Bin Khalid, "Symmetric Algorithm Survey: A Comparative Analysis", International Journal of Computer Applications (0975-8887), vol. 61, no. 20, Jan. 2013.
10 Serpent, http://www.cl.cam.ac.uk/-rja14/serpent.html
11 CISCO, "IoT", https://www.cisco.com/c/en/us/solutions/internet-of-things/overview.html#-stickynav=1(accessed Jan., 10, 2017)
12 Microsoft, "iot", https://www.microsoft.com/en-us/internet-of-things/(accessed Feb., 13, 2017)
13 IBM, "iot", https://www.ibm.com/internet-of-things/ (accessed Feb., 13, 2017)
14 AJ Elbirt, C Paar, "An FPGA Implementation and Performance Evaluation of the Serpent Block Cipher", Field-Programmable Gate Arrays, International ACM Symposium on (2000), pp. 33-40, Feb. 11, 2000. DOI: https://doi.org/10.1145/329166.329176   DOI